Siemens 5890 manual Secure Shell, Key Generator

Page 74

SIEMENS 5890 DSL Router

Chapter 6 Security Setup

User’s Guide

Secure Shell

 

 

Secure Shell

Secure Shell (SSH) secures network services (such as remote terminal sessions, remote command execution, secure FTP type file transfers, and secure tunneling of TCP traffic between two networks) over an insecure network, such as the public Internet. SSH creates an encrypted and authenticated channel between hosts for all communication. An SSH server, by default, listens on the standard TCP port 22.

The objective of SSH is to make a secure functional equivalent for telnet. Telnet connections and commands are vulnerable to a variety of different kinds of attacks allowing unauthorized system access, and even allowing interception and logging of traffic to and from the system including passwords. SSH protects against:

IP spoofing, where a remote host sends out packets that pretend to come from another, trusted host. SSH also protects against spoofing on the local network when attempting to deceive, posing as the router to the outside.

IP source routing, where a host can pretend that an IP packet comes from another trusted host.

DNS spoofing, where an attacker forges name server records.

Interception of clear text passwords and other data by intermediate hosts.

Manipulation of data by users in control of intermediate hosts.

To access the Secure Shell configuration pages, click Secure Shell from the left navigation pane on the Router Information page. This displays the Secure Shell (SSH) Configuration List page.

This page displays the current SSH configuration settings as well as provides links to the other SSH configuration pages.

Configure SSH

Configure SSH.

Load Keys

Load public and private SSH keys used to authenticate the

 

SSH server from a source file.

Key Generator

Generate public and private SSH keys.

Key Generator Status

Check the status of the key generation process.

SIEMENS

68

Image 74
Contents 5890 Software License and Limited Warranty Software LicenseGeneral Provisions Table of Contents Security Setup User SetupAdvanced Setup Monitoring Router Front Panel Back PanelHardware Specifications Software Specifications Security Frame RelayPPP RFC 1661, RFC PC Requirements Installation RequirementsPackage Contents Network Service Provider Requirements Hardware Installation PC Configuration Windows 98/MEWindows NT Select TCP/IP Protocol from the Network Protocols listWindows Windows XP Mac OS Mac OSX Linux Configuring the Router Establish ConnectionRouter Information To do this Refer toAccess Easy Setup Wizard Select ProtocolPoint-to-Point Protocol over ATM VC Multiplexing Bridging EnabledIP Routing Enabled NAT Enabled Block Net Bios TrafficPoint-to-Point Protocol over ATM LLC Encapsulation NAT Enabled RFC 1483 Multiprotocol Encapsulation LLC/SNAP RFC 1483 VC Multiplexing Routed Point-to-Point Protocol over Ethernet over RFC1483 RFC 1483 MAC Encapsulated Routing MER RAW IP Dynamic Host Configuration Protocol Local Area Network Configuration User Setup User ManagementAdding/Modifying a User Account Deleting a User Account Radius User LookupLocal NoneUntrusted Secure Mode ConfigurationTrusted Configure the Radius Server Configure the TacPlus Server Management Classes Class Functional AreasChange Password Click Save and Reboot Access ControlNo access restrictions Telnet WebAdvanced Setup WAN Selection Sdsl ATM or Sdsl Frame RelayRemote File Configuration DMZ DMZ Router Clock Dhcp Dhcp QoS Differentiated Services FrameworkWeighted Fair Queuing Configure QoS policies Configure QoS Policy Siemens Before policy Reorder QoS PoliciesTo the end Routing Table Configuration Dial Backup Click Enable Dial BackupATM Traffic Shaping Non Real-Time Variable Bit Rate Constant Bit RateReal-Time Variable Bit Rate Unspecified Bit RateSwitch Management Switch Mirror Configuration Switch Age Time Command Line Interface File Editor Security Setup NAT NAT Server Configuration NAT Host Mapping Port Number DisableDefault Snmp IP Filter Click Add IP RangeSnmp Password Enter the New Password and New Password againSecure Shell Key GeneratorConfigure SSH Load Keys Key Generator Firewall Scripts Stateful Firewall Firewall RulesConfigure Stateful Firewall View Dropped Packets Configure Firewall Rules Protocol/Port ApplicationDelete Firewall Rules IKE/IPSec Configuration Easy IKE/IPSec Setup Advanced IKE/IPSec Setup IKE PeersIKE Peers Definition IKE Proposals Definition IKE IPSec Proposals Definition Siemens IKE IPSec Policies Definition Siemens VPN Log On Monitoring Router System SummaryEthernet Interface Information Remote Connection InformationIP Routing Information System InformationDiagnostics PPPoE SessionInterface Information ATM StatisticsRouting Table Information Files InformationList All Configuration Data Memory UsageTCP/IP Statistics